Pregunta 1
Pregunta
Which attack listens to network traffic of a computer resource?
Respuesta
-
Resource gathering
-
Denial of service
-
ARP poisoning
-
Eavesdropping
-
Logic bomb
Pregunta 2
Pregunta
The default password length for a Windows Server domain controller is:
Pregunta 3
Pregunta
What does NAT do?
Respuesta
-
It encrypts and authenticates IP packets.
-
It provides caching and reduces network traffic.
-
It translates public IP addresses to private addresses and vice versa.
-
It analyzes incoming and outgoing traffic packets.
Pregunta 4
Pregunta
Role separation improves server security by:
Respuesta
-
Enforcing principle of least privilege.
-
Installing applications on separate hard disks.
-
Physically separating high security servers from other servers.
-
Placing servers on separate VLANs.
Pregunta 5
Pregunta
The Graphic Design Institute hires you to help them set up a server for their 20-person
team.
As a general practice of hardening the server, you start by performing which two tasks?
(Choose two.)
Respuesta
-
Disable the guest account.
-
Rename the admin account.
-
Remove the account lockout policy.
-
Format partitions with FAT32.
Pregunta 6
Pregunta
A network sniffer is software or hardware that:
Respuesta
-
Records user activity and transmits it to the server
-
Captures and analyzes network communication
-
Protects workstations from intrusions
-
Catalogs network data to create a secure index
Pregunta 7
Pregunta
Alice sends her password to the game server in plaintext. Chuck is able to observe her
password as shown in the following image:
The scenario demonstrated is a(n) [blank_start][answer choice][blank_end] attack.
Respuesta
-
main in the middle
-
eavesdropping
-
denial of service
Pregunta 8
Pregunta
Alice sends her password to the game server in plaintext. Chuck is able to observe her
password as shown in the following image:
Alice should [blank_start][answer choice][blank_end] to avoid this type of attack.
Respuesta
-
never send a plaintext password
-
only send pw N plaintxt 2known companies
-
only send pw N plaintxt over the local n
Pregunta 9
Pregunta
Your password is 1Vu*cI!8sT.
Which attack method is your password vulnerable to?
Respuesta
-
Rainbow table
-
Brute force
-
Spidering
-
Dictionary
Pregunta 10
Pregunta
A group of users has access to Folder A and all of its contents. You need to prevent some
of the users from accessing a subfolder inside Folder A.
What should you do first?
Respuesta
-
Disable folder sharing
-
Hide the folder
-
Change the owner
-
Block inheritance
Pregunta 11
Pregunta
Many Internet sites that you visit require a user name and password.
How should you secure these passwords?
Pregunta 12
Pregunta
Bridging is a process of sending packets from source to destination on OSI layer 3.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed" if the underlined text makes the statement correct.
Respuesta
-
Routing
-
Switching
-
Repeating
-
No change is needed.
Pregunta 13
Pregunta
You need to install a domain controller in a branch office. You also need to secure the
information on the domain controller. You will be unable to physically secure the server.
Which should you implement?
Respuesta
-
Read-Only Domain Controller
-
Point-to-Point Tunneling Protocol (PPTP)
-
Layer 2 Tunneling Protocol (L2TP)
-
Server Core Domain Controller
Pregunta 14
Pregunta
What are two attributes that an email message may contain that should cause a user to
question whether the message is a phishing attempt? (Choose two.)
Respuesta
-
An image contained in the message
-
Spelling and grammar errors
-
Threats of losing service
-
Use of bold and italics
Pregunta 15
Pregunta
The WPA2 PreShared Key (PSK) is created by using a passphrase (password) and salting
it with the WPS PIN.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed" if the underlined text makes the statement correct.
Pregunta 16
Pregunta
To implement WPA2 Enterprise, you would need a/an:
Respuesta
-
RADIUS server
-
SSL server
-
WEP server
-
VPN server
Pregunta 17
Pregunta
You are volunteering at an organization that gets a brand new web server. To make the
server more secure, you should add a second administrator account.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed" if the underlined text makes the statement correct.
Pregunta 18
Pregunta
Which two characteristics should you recommend for a user's domain password? (Choose
two.)
Pregunta 19
Pregunta
What is a service set identifier (SSID)?
Respuesta
-
A wireless encryption standard
-
The wireless LAN transmission type
-
The broadcast name of an access point
-
A wireless security protocol
Pregunta 20
Pregunta
You can view audit logs in the Event Viewer
[blank_start]yes[blank_end]
Audit logs have a set size limit and cannot be adjusted.
[blank_start]no[blank_end]
You can configure an email event notification for an audited activity.
[blank_start]yes[blank_end]
Pregunta 21
Pregunta
Which is the minimum requirement to create BitLocker-To-Go media on a client computer?
Respuesta
-
Windows XP Professional Service Pack 3
-
Windows Vista Enterprise Edition
-
Windows 7 Enterprise Edition
-
Windows 2000 Professional Service Pack 4
Pregunta 22
Pregunta
The Active Directory controls, enforces, and assigns security policies and access rights for
all users.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed" if the underlined text makes the statement correct.
Respuesta
-
NTFS permissions
-
User Account Control
-
Registry
-
No change is needed
Pregunta 23
Pregunta
Which two security settings can be controlled by using group policy? (Choose two.)
Pregunta 24
Pregunta
Coho Winery wants to increase their web presence and hires you to set up a new web
server. Coho already has servers for their business and would like to avoid purchasing a
new one.
Which server is best to use as a web server, considering the security and performance
concerns?
Respuesta
-
SQL Server
-
File Server
-
Domain Controller
-
Application Server
Pregunta 25
Pregunta
Cookies impact security by enabling: (Choose two.)
Respuesta
-
Storage of Web site passwords.
-
Higher security Web site protections.
-
Secure Sockets Layer (SSL).
-
Web sites to track browsing habits.
Pregunta 26
Pregunta
To protect systems from buffer overflow errors, you can use:
Pregunta 27
Pregunta
Account lockout policies are used to prevent which type of security attack?
Pregunta 28
Pregunta
An employee where you work is unable to access the company message board in Internet
Explorer.
You review her Internet Options dialog box, as shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement.
Each correct selection is worth one point.
This message board, http://mkteam/, would be affected by settings under the [blank_start][answer choice][blank_end] security zone.
The employee can see the site, but ActiveX controls will not load. You have to [blank_start][answer choice][blank_end]
Respuesta
-
Internet
-
Local Intranet
-
Restricted Sites
-
change the security level on Local Intra
-
change the security level on Internet.
-
uncheck Enable Protected Mode.
Pregunta 29
Pregunta
A user who receives a large number of emails selling prescription medicine is probably
receiving pharming mail.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed" if the underlined text makes the statement correct.
Respuesta
-
Malware
-
Spoofed mail
-
Spam
-
No change is needed.
Pregunta 30
Pregunta
For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.
To protect users from untrusted browser pop-ups, you may set a default browser configuration that blocks all pop-ups and automated downloads. [blank_start][answer choice][blank_end]
Online pop-ups and dialog boxes can display a realistic operating system or application error messages. [blank_start][answer choice][blank_end]
Protecting users from untrusted pop-up applications is mostly a function of awareness. [blank_start][answer choice][blank_end]
Pregunta 31
Pregunta
You want to make your computer resistant to online hackers and malicious software.
What should you do?
Respuesta
-
Configure a forward proxy.
-
Install anti-virus software.
-
Enable spam filtering.
-
Turn on Windows Firewall.
Pregunta 32
Pregunta
The certificate of a secure public Web server on the Internet should be:
Respuesta
-
Issued by a public certificate authority (CA)
-
Signed by using a 4096-bit key
-
Signed by using a 1024-bit key
-
Issued by an enterprise certificate authority (CA)
Pregunta 33
Pregunta
The primary method of authentication in an SSL connection is passwords.
To answer, choose the option "No change is needed" if the underlined text is correct. If the
underlined text is not correct, choose the correct answer.
Respuesta
-
No change is needed
-
Certificates
-
IPsec
-
Biometrics
Pregunta 34
Pregunta
Because senior executives have rights to access sensitive data, hey should use administrator accounts[blank_start][Answer choice][blank_end]
The User Account Control (UAC) has one overall goal: to grant users the lowest level permissions required to complete their tasks. [blank_start][Answer choice][blank_end]
System administrators should use a standard user account when performing routine functions like reading emails and browsing the Internet. [blank_start][Answer choice][blank_end]
Pregunta 35
Pregunta
What is a common method for password collection?
Respuesta
-
Email attachments
-
Back door intrusions
-
SQL Injection
-
Network sniffers
Pregunta 36
Pregunta
You are at school and logged in to a Windows 7 computer using a standard user account.
You need to change some of the properties of a desktop icon for an assignment. Your
instructor provides you with an administrator username and password and asks you to do
two tasks.
When you open the Need Admin Access Properties window, you see the following image:
To allow this log file to be opened as an administrator, you should [blank_start][answer choice][blank_end]
A. click Advanced and choose "run as administrator".
B. click Run and choose "run as administer."
C. click the Security tab and give admin rights to your standard account.
To allow this log file to be opened in a maximized window, you should [blank_start][answer choice][blank_end]
A. click Run and choose "maximized window."
B. click the General tab and click "change to open the document as a maximized window."
C. click Change Icon to choose "run as a maximized window
Respuesta
-
click Advanced and choose "run as admini
-
click Run and and chose "run as administ
-
click the Security tab and give admin ri
-
click Run and choose "maximized window."
-
click the General tab and click "change
-
click Change Icon to choose "run as a ma
Pregunta 37
Pregunta
You are an intern and are working remotely.
You need a solution that meets the following requirements:
✑ Allows you to access data on the company network securely
✑ Gives you the same privileges and access as if you were in the office
What are two connection methods you could use? (Choose two.
Pregunta 38
Pregunta
For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.
There are several built-in basic audit policies and advanced audit policies in Windows. [blank_start][answer choice][blank_end]
Advanced audit policies applied by a Group Policy are compatible with a basic audit policy. [blank_start][answer choice][blank_end]
A system access control list (SACL) enables administrators to log attempts to access a secured object. [blank_start][answer choice][blank_end]
Pregunta 39
Pregunta
A digitally signed e-mail message:
Respuesta
-
Validates the recipient
-
Validates the sender
-
Is encrypted
-
Is virus-free
Pregunta 40
Pregunta
To keep third-party content providers from tracking your movements on the web, enable
InPrivate Browsing.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed'' if the underlined text makes the statement correct.
Respuesta
-
InPrivate Filtering
-
SmartScreen Filter
-
Compatibility Mode
-
No change is needed
Pregunta 41
Pregunta
For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.
IPsec requires network applications to be IPsec aware. [blank_start][answer choice][blank_end]
IPsec encrypts data. [blank_start][answer choice][blank_end]
IPsec adds overhead for all network communications for which it is used. [blank_start][answer choice][blank_end]
Pregunta 42
Pregunta
Keeping a server updated:
Pregunta 43
Pregunta
Humongous Insurance needs to set up a domain controller in a branch office.
Unfortunately, the server cannot be sufficiently secured from access by employees in that
office, so the company is installing a Primary Domain Controller.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed" if the underlined text makes the statement correct.
Pregunta 44
Pregunta
Phishing is an attempt to:
Respuesta
-
Obtain information by posing as a trustworthy entity.
-
Limit access to e-mail systems by authorized users.
-
Steal data through the use of network intrusion.
-
Corrupt e-mail databases through the use of viruses.
Pregunta 45
Pregunta
You are preparing an audit policy for the workstations at Contoso, Ltd. Currently, no
advanced auditing is enabled. The workstations are not members of the domain.
The settings of your Advanced Audit Policy Configuration are shown in the following image:
To enable auditing of all local login events, you need to turn on the [blank_start][answer choice][blank_end] Advanced Audit Policy.
You need to know when someone accesses files in the c: \tempt directory. Auditing is turned on for this directory. You need to enable the [blank_start][answer choice][blank_end] Advanced Audit Policy to log these events.
Respuesta
-
Logon/Logoff
-
Account Logon
-
System
-
Object Access
-
Privilege Use
-
System
Pregunta 46
Pregunta
What is an example of non-propagating malicious code?
Respuesta
-
A back door
-
A hoax
-
A Trojan horse
-
A worm
Pregunta 47
Pregunta
You create a web server for your school. When users visit your site, they get a certificate
error that says your site is not trusted.
What should you do to fix this problem?
Respuesta
-
Install a certificate from a trusted Certificate Authority (CA).
-
Use a digital signature.
-
Generate a certificate request.
-
Enable Public Keys on your website.
Pregunta 48
Pregunta
For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.
UAC reduces your permissions to that of a standard user unless higher permissions are necessary. [blank_start][answer choice][blank_end]
UAC notifies you when additional permissions are required and asks if you wish to continue. [blank_start][answer choice][blank_end]
UAC cannot be disabled. [blank_start][answer choice][blank_end]
Pregunta 49
Pregunta
Windows Server Update Services (WSUS) is a tool that:
Respuesta
-
Updates data stored in Windows servers
-
Manages the services that run on a server
-
Updates licensing for Windows servers
-
Manages updates for Microsoft software
Pregunta 50
Pregunta
The purpose of Microsoft Baseline Security Analyzer is to:
Respuesta
-
List system vulnerabilities.
-
Apply all current patches to a server.
-
Set permissions to a default level.
-
Correct a company's security state.
Pregunta 51
Pregunta
For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.
If your computer is on a domain, your network administrator can reset your password. [blank_start][answer choice][blank_end]
An administrator account can reset a password for a standard user account. [blank_start][answer choice][blank_end]
There is a risk of losing access to encrypted files if a password is reset. [blank_start][answer choice][blank_end]
Pregunta 52
Pregunta
In Internet Explorer 8, the InPrivate Browsing feature prevents:
Respuesta
-
Unauthorized private data input.
-
Unencrypted communication between the client computer and the server.
-
User credentials from being sent over the Internet.
-
Any session data from being stored on the computer.
Pregunta 53
Pregunta
Which enables you to change the permissions on a folder?
Respuesta
-
Take ownership
-
Extended attributes
-
Auditing
-
Modify
Pregunta 54
Pregunta
To prevent users from copying data to removable media, you should:
Pregunta 55
Pregunta
Which technology enables you to filter communications between a program and the
Internet?
Respuesta
-
RADIUS server
-
Antivirus software
-
Software firewall
-
BitLocker To Go
Pregunta 56
Pregunta
This question requires that you evaluate the underlined text to determine if it is correct.
The first line of defense against attacks from the Internet is a software firewall.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed'' if the underlined text makes the statement correct.
Respuesta
-
hardware firewall
-
virus software
-
radius server
-
No change is needed
Pregunta 57
Pregunta
For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.
BitLocker to Go Reader allows you to encrypt drives. [blank_start][answer choice][blank_end]
BitLocker to Go Reader requires drives that are encrypted using a password. [blank_start][answer choice][blank_end]
BitLocker to Go works on Windows Vista and Windows XP. [blank_start][answer choice][blank_end]
Pregunta 58
Pregunta
Which type of firewall allows for inspection of all characteristics of a packet?
Respuesta
-
NAT
-
Stateful
-
Stateless
-
Windows Defender
Pregunta 59
Pregunta
You suspect a user's computer is infected by a virus.
What should you do first?
Respuesta
-
Restart the computer in safe mode
-
Replace the computer's hard disk drive
-
Disconnect the computer from the network
-
Install antivirus software on the computer
Pregunta 60
Pregunta
You need to prevent unauthorized users from reading a specific file on a portable computer
if the portable computer is stolen.
What should you implement?
Pregunta 61
Pregunta
Basic security questions used to reset a password are susceptible to:
Respuesta
-
Hashing
-
Social engineering
-
Network sniffing
-
Trojan horses
Pregunta 62
Pregunta
For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.
DNSSEC prevents spoofing of query responses. [blank_start][answer choice][blank_end]
Client can verify that DNS server that they are communicating with is legitimate. [blank_start][answer choice][blank_end]
DNSSEC prevents man-in-the-middle attacks for DNS queries. [blank_start][answer choice][blank_end]
Pregunta 63
Pregunta
Which is a special folder permission?
Pregunta 64
Pregunta
Network Access Protection (NAP) enables administrators to control access to network
resources based on a computer's:
Respuesta
-
Encryption level
-
Warranty
-
Physical location
-
Configuration
Pregunta 65
Pregunta
A mail system administrator scans for viruses in incoming emails to increase the speed of
mail processing.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed" if the underlined text makes the statement correct.
Respuesta
-
Decrease the chances of a virus getting to a client machine
-
Verify that the senders of the messages are legitimate
-
Ensure that all links in the messages are trustworthy
-
No change is needed.
Pregunta 66
Pregunta
Before you deploy Network Access Protection (NAP), you must install:
Respuesta
-
Internet Information Server (IIS)
-
Network Policy Server (NPS)
-
Active Directory Federation Services
-
Windows Update Service
Pregunta 67
Pregunta
The company that you work for wants to set up a secure network, but they do not have any
servers.
Which three security methods require the use of a server? (Choose three.)
Respuesta
-
802.1x
-
WPA2 Personal
-
WPA2 Enterprise
-
RADIUS
-
802.11ac
Pregunta 68
Pregunta
What are three major attack vectors that a social engineering hacker may use? (Choose
three.)
Pregunta 69
Pregunta
Password history policies are used to prevent:
Pregunta 70
Pregunta
E-mail bombing attacks a specific entity by:
Respuesta
-
Redirecting all e-mail to another entity
-
Sending high volumes of e-mail
-
Tracing e-mail to the destination address
-
Triggering high levels of security alerts
Pregunta 71
Pregunta
Which two are included in an enterprise antivirus program? (Choose two.)
Respuesta
-
Attack surface scanning
-
On-demand scanning
-
Packet scanning
-
Scheduled scanning
Pregunta 72
Pregunta
The Windows Firewall protects computers from unauthorized network connections.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed'' if the underlined text makes the statement correct.
Pregunta 73
Pregunta
When conducting a security audit the first step is to:
Respuesta
-
Inventory the company's technology assets
-
Install auditing software on your servers
-
Set up the system logs to audit security events
-
Set up a virus quarantine area
Pregunta 74
Pregunta
Setting a minimum password age restricts when users can:
Pregunta 75
Pregunta
The purpose of a digital certificate is to verify that a:
Respuesta
-
Public key belongs to a sender.
-
Computer is virus-free.
-
Private key belongs to a sender.
-
Digital document is complete.
Pregunta 76
Pregunta
You create a new file in a folder that has inheritance enabled.
By default, the new file:
Respuesta
-
Takes the permissions of the parent folder
-
Does not take any permissions
-
Takes the permissions of other folders in the same directory
-
Takes the permissions of other files in the same directory
Pregunta 77
Pregunta
Dumpster diving refers to a physical threat that a hacker might use to look for information
about a computer network.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed" if the underlined text makes the statement correct.
Pregunta 78
Pregunta
You need to grant a set of users write access to a file on a network share. You should add
the users to:
Pregunta 79
Pregunta
Your company requires that users type a series of characters to access the wireless
network.
The series of characters must meet the following requirements:
✑ Contains more than 15 characters
✑ Contains at least one letter
✑ Contains at least one number
✑ Contains at least one symbol
Which security technology meets these requirements?
Respuesta
-
WEP
-
WPA2 PSK
-
WPA2 Enterprise
-
MAC filtering
Pregunta 80
Pregunta
The manager of a coffee shop hires you to securely set up WiFi in the shop.
To keep computer users from seeing each other, what should you use with an access
point?
Respuesta
-
Client bridge mode
-
Client isolation mode
-
MAC address filtering
-
Client mode
Pregunta 81
Pregunta
You have two servers that run Windows Server. All drives on both servers are formatted by
using NTFS.
You move a file from one server to the other server. The file's permissions in the new
location will:
Respuesta
-
Enable full access to the everyone group
-
Restrict access to the Administrators group
-
Inherit the destination folder's permissions
-
Retain the original folder's permissions
Pregunta 82
Pregunta
Which three elements does HTTPS encrypt? (Choose three.)
Respuesta
-
Browser cookies
-
Server IP address
-
Port numbers
-
Website URL
-
Login information
Pregunta 83
Pregunta
For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.
Honey pots are primarily used to attract potential attackers or hackers. [blank_start][answer choice][blank_end]
By setting up a honey pot, an administrator can get insightful information by the attacker, such as the IP address. [blank_start][answer choice][blank_end]
A honey pot is an appliance or piece of software that allows or denies network access based on a preconfigured set of rules. [blank_start][answer choice][blank_end]
Pregunta 84
Pregunta
Shredding documents helps prevent:
Pregunta 85
Pregunta
For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.
By using NAP, administrators can place non-compliant computers onto restricted networks. [blank_start][answer choice][blank_end]
All computers that are not in compliance with NAP policies require manual intervention to be brought into compliance. [blank_start][answer choice][blank_end]
NAP can enforce that client computers are running a firewall. [blank_start][answer choice][blank_end]
Pregunta 86
Pregunta
What are three examples of two-factor authentication? (Choose three.)
Respuesta
-
A fingerprint and a pattern
-
A password and a smart card
-
A username and a password
-
A password and a pin number
-
A pin number and a debit card
Pregunta 87
Pregunta
Passwords that contain recognizable words are vulnerable to a:
Respuesta
-
Denial of Service attack
-
Hashing attack
-
Dictionary attack
-
Replay attack
Pregunta 88
Pregunta
A brute force attack:
Pregunta 89
Pregunta
The purpose of User Account Control (UAC) is to:
Respuesta
-
Encrypt the user's account
-
Limit the privileges of software
-
Secure your data from corruption
-
Facilitate Internet filtering
Pregunta 90
Pregunta
You are setting up Remote Desktop on your computer. Your computer is a member of a
domain.
Your firewall configuration is shown in the following image:
You need to allow Remote Desktop to be able to get through your firewall for users on your
company's network.
Which settings should you enable?
Respuesta
-
Remote Assistance: Home/Work (Private)
-
Remote Desktop: Public
-
Remote Desktop: Home/Work (Private)
-
Remote Assistance: Domain
Pregunta 91
Pregunta
For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.
Tools like Microsoft Security Compliance Manager and Microsoft Baseline Security Analyzer can assist with server hardening. [blank_start][answer choice][blank_end]
Administrator passwords may contain ASCII characters generated by a combination of the ALT key and three digits on the numeric keypad. [blank_start][answer choice][blank_end]
The removal of unused registry entries and executables increases the surface vulnerability of the server. [blank_start][answer choice][blank_end]
Pregunta 92
Pregunta
Windows Firewall is a built-in. host-based, stateless firewall.
Select the correct answer if the underlined text does not make the statement correct. Select
"No change is needed" if the underlined text makes the statement correct.
Respuesta
-
Stateful
-
Network layer
-
Packet filter
-
No change is needed
Pregunta 93
Pregunta
For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.
FAT32 has built-in security features that control user access. [blank_start][answer choice][blank_end]
NFTS has built-in security features that control file access. [blank_start][answer choice][blank_end]
All users on the same FAT32 file system have access rights to all files. [blank_start][answer choice][blank_end]
Pregunta 94
Pregunta
An attorney hires you to increase the wireless network security for the law firm's office. The
office has a very basic network, with just a modem and a router.
Which of these security modes offers the highest security?
Respuesta
-
WPA-Personal
-
WEP
-
WPA2-Personal
-
WPA-Enterprise
Pregunta 95
Pregunta
For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.
Smart cards can be used in biometrics-based systems. [blank_start][answer choice][blank_end]
Smart cards can be read from distances of several inches to many yards. [blank_start][answer choice][blank_end]
Smart cards provide a means of securely storing data on the card. [blank_start][answer choice][blank_end]
Pregunta 96
Pregunta
What is the primary advantage of using Active Directory Integrated Zones?
Respuesta
-
Zone encryption
-
Password protection
-
Non-repudiation
-
Secure replication
Pregunta 97
Pregunta
You sign up for an online bank account. Every 6 months, the bank requires you to change
your password. You have changed your password 5 times in the past. Instead of coming up
with a new password, you decide to use one of your past passwords, but the bank's
password history prevents you on doing so.
Select the correct answer if the underlined text does not make the statement correct Select
"No change is needed" if the underlined text makes the statement correct.
Pregunta 98
Pregunta
You have a Windows 7 desktop computer, and you create a Standard User account for
your roommate so that he can use the desktop from time to time. Your roommate has
forgotten his password.
Which two actions can you take to reset the password? (Choose two.)
Respuesta
-
Use your password reset disk.
-
Use your administrator account.
-
Boot into Safe Mode with your roommate's account.
-
From your roommate's account press CTRL+ALT+DELETE, and then click Change a password.
Pregunta 99
Pregunta
Which password attack uses all possible alpha numeric combinations?
Respuesta
-
Social engineering
-
Brute force attack
-
Dictionary attack
-
Rainbow table attack
Pregunta 100
Pregunta
You need to limit the programs that can run on client computers to a specific list.
Which technology should you implement?
Pregunta 101
Pregunta
Creating MD5 hash for files is an example of ensuring what?
Respuesta
-
Confidentiality
-
Availability
-
Least privilege
-
Integrity
Pregunta 102
Pregunta
Physically securing servers prevents:
Respuesta
-
Theft
-
Compromise of the certificate chain
-
Man-in-the middle attacks
-
Denial of Service attacks
Pregunta 103
Pregunta
Which of the following describes a VLAN?
Respuesta
-
It connects multiple networks and routes data packets.
-
It is a logical broadcast domain across physical subnets.
-
It is a subnetwork that reveals a company's externally facing resources to the public network.
-
It allows different network protocols to communicate between different network segments.
Pregunta 104
Pregunta
E-mail spoofing:
Respuesta
-
Forwards e-mail messages to all contacts
-
Copies e-mail messages sent from a specific user
-
Obscures the true e-mail sender
-
Modifies e-mail routing logs
Pregunta 105
Pregunta
The client computers on your network are stable and do not need any new features.
Which is a benefit of applying operating system updates to these clients?
Respuesta
-
Keep the software licensed
-
Keep the server ports available
-
Update the hardware firewall
-
Close existing vulnerabilities
Pregunta 106
Pregunta
For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.
Biometrics are used to authenticate users. [blank_start][answer choice][blank_end]
Biometric data is usually encrypted when it is gathered.[blank_start][answer choice][blank_end]
An example of a biometric device is a fingerprint scanner. [blank_start][answer choice][blank_end]
Pregunta 107
Pregunta
What does implementing Windows Server Update Services (WSUS) allow a company to
manage?
Respuesta
-
Shared private encryption key updates
-
Updates to Group Policy Objects
-
Active Directory server replication
-
Windows updates for workstations and servers
Pregunta 108
Pregunta
The primary purpose of Network Access Protection (NAP) is to prevent:
Respuesta
-
Loss of data from client computers on a network.
-
Non-compliant systems from connecting to a network.
-
Users on a network from installing software.
-
Unauthorized users from accessing a network.
Pregunta 109
Pregunta
You are trying to establish communications between a client computer and a server. The
server is not responding.
You confirm that both the client and the server have network connectivity.
Which should you check next?
Pregunta 110
Pregunta
You are an intern at Litware, Inc. Your manager asks you to make password guess
attempts harder by limiting login attempts on company computers.
What should you do?
Respuesta
-
Enforce password sniffing.
-
Enforce password history.
-
Make password complexity requirements higher.
-
Implement account lockout policy.
Pregunta 111
Pregunta
You would implement a wireless intrusion prevention system to:
Respuesta
-
Prevent wireless interference
-
Detect wireless packet theft
-
Prevent rogue wireless access points
-
Enforce SSID broadcasting
Pregunta 112
Pregunta
What is the standard or basic collection of NTFS permissions?
Respuesta
-
Read and execute, read, write, full control, modify, list folder contents
-
Change permissions, read permissions, write permissions
-
Read attributes, list folder/read data, traverse folder/execute file
-
Create files/write data, create folders/append data, take ownership
Pregunta 113
Pregunta
You are an intern at Wide World Importers and help manage 1000 workstations. All the
workstations are members of an Active Domain.
You need to push out an internal certificate to Internet Explorer on all workstations.
What is the quickest method to do this?
Respuesta
-
Local policy
-
Logon script
-
Windows Update
-
Group policy
Pregunta 114
Pregunta
Your supervisor asks you to review file permission settings on the application.bat file.
You need to report which file system the file is on and the type of permission the file has.
You review the application Properties dialog box shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement.
Each correct selection is worth one point.
The "cygwin.bat" file in the image is currently on the [blank_start][answer choice][blank_end] file system.
[blank_start][answer choice][blank_end] permissions are currently being displayed for the "cygwin.bat" file.
Respuesta
-
FAT16
-
FAT32
-
NTFS
-
Basic
-
Advanced
-
Full Control
Pregunta 115
Pregunta
How does the sender policy framework (SPF) aim to reduce spoofed email?
Respuesta
-
It provides a list of IP address ranges for particular domains so senders can be verified.
-
It includes an XML policy file with each email that confirms the validity of the message.
-
It lists servers that may legitimately forward mail for a particular domain.
-
It provides an encryption key so that authenticity of an email message can be validated.
Pregunta 116
Pregunta
You are trying to connect to an FTP server on the Internet from a computer in a school lab.
You cannot get a connection. You try on another computer with the same results. The
computers in the lab are able to browse the Internet.
You are able to connect to this FTP server from home.
What could be blocking the connection to the server?
Respuesta
-
A layer-2 switch
-
A wireless access point
-
A firewall
-
A layer-2 hub
Pregunta 117
Pregunta
You are an intern for a company where your manager wants to be sure you understand the
social engineering threats that may occur. Your manager emphasizes the principles of the
Microsoft Defense-in-Depth Security Model shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement.
Each correct selection is worth one point.
The [blank_start][answer choice][blank_end] defense targets staff within an organization, explaining what to do, when, why, and by whom.
The overarching defense of the Microsoft Defense-in-Depth Security Model is [blank_start][answer choice][blank_end]
Respuesta
-
Policies, Procedures, and Awareness
-
Data Defenses
-
Physical Security
-
Policies, Procedures, and Awareness
-
Network Defenses
-
Data Defenses
Pregunta 118
Pregunta
Humongous Insurance is an online healthcare insurance company. During an annual
security audit a security firm tests the strength of the company's password policy and
suggests that Humongous Insurance implement password history policy.
What is the likely reason that the security firm suggests this?
Respuesta
-
Past passwords were easily cracked by the brute force method.
-
Past passwords of users contained dictionary words.
-
Previous password breaches involved use of past passwords.
-
Past passwords lacked complexity and special characters.
Pregunta 119
Pregunta
Which enables access to all of the logged-in user's capabilities on a computer?
Pregunta 120
Pregunta
Where should you lock up the backup tapes for your servers?
Respuesta
-
The server room
-
A filing cabinet
-
The tape library
-
An offsite fire safe
Pregunta 121
Pregunta
Which provides the highest level of security in a firewall?
Respuesta
-
Stateful inspection
-
Outbound packet filters
-
Stateless inspection
-
Inbound packet filters
Pregunta 122
Pregunta
Alice and Bob are exchanging messages with each other. Chuck modifies the messages
sent between Alice and Bob as shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement.
Each correct selection is worth one point.
The scenario demonstrated is a [blank_start][answer choice][blank_end] attack.
Alice and Bob could add a [blank_start][answer choice][blank_end] to avoid this type of attack.
Respuesta
-
man in the middle
-
phishing
-
denial of service
-
checksum
-
digital signature
-
timestamp
Pregunta 123
Pregunta
For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.
An intruder can spoof MAC addresses to get around MAC address filtering. [blank_start][answer choice][blank_end]
Intruders can find a wireless network if the Service Set Identifier (SSID) is hidden. [blank_start][answer choice][blank_end]
WEP security is strong as long as it has a 128-bit key. [blank_start][answer choice][blank_end]
Pregunta 124
Pregunta
You are preparing a local audit policy for your workstation. No auditing is enabled.
The settings of your policy are shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement.
Each correct selection is worth one point.
In order to log each time the computer validates account credentials, the [blank_start][answer choice][blank_end] policy needs to be enabled.
You need to log each time someone reboots the workstation. The [blank_start][answer choice][blank_end] policy will log a reboot of the computer.